To me, the North American Wood Frog is one of the great marvels of the world! When Winter comes and the frog first touches any ice, it sets off signals inside of its body to pull water away from the rest of its body and center it in a puddle around all its vital organs. That water is then turned into solid ice and freezes all its vital organs.
At this stage, there is no breathing. Its kidneys cease to function, and get this, its heart stops beating! There is literally no pulse! Somehow, it is able to flood itself with a type of glucose that works like an anti-freeze and keeps it still alive through the Winter. The frog comes to as close to death as you could ever get.
When the Spring begins to appear something miraculous happens. It begins to thaw out. Its pulse returns, and within about 10 hours it is back on its “frog legs” again. It jumps around as if winter didn’t even exist. This is truly remarkable!
Nature’s little marvels have so many built in ways to protect and secure themselves from the forces outside that could harm them. We mortals, many times do not have these “built in” mechanisms. Most of the time we have to work hard at protecting ourselves.
This is true if you want to keep your cryptocurrency secure. There is no computer, no online security system, no device that is totally 100 % full-proof. There are, however, many practical measures that a person can easily take to truly up the odds of never having your cryptocurrency stolen.
Consider these few simple and easily measures:
A Virtual Private Network(VPN) creates a secure computer connection to a separate network over the internet. A VPN will shield your browsing activity from hackers and onlookers spying in on you. In the viewing of hackers and spies it will appear as if you are logging in from a different city than you actually are—or even a different country. This makes it much more difficult for them to find you and hack you. You can subscribe to a VPN for as little as 10 cents per day.
Anti- Key Logger Software
An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software. Often such software will also incorporate the ability to delete or at least immobilize hidden keystroke logger software on a computer.(Google)
Brave Browser comes with a private window with TOR. TOR hides your IP address from the sites you visit, by routing your browsing through several TOR servers before it reaches your destination. The connections are encrypted, so your ISP or employer can’t see which sites you are visiting either. I
2FA 2 factor authentication. “Two-factor authentication (2FA) is a second layer of security to protect an account or system. Users must go through two layers of security before being granted access to an account or system” (Google). When trying to login to a website, the website will send a message to your email or phone with a one-time code. You will need that code to login. Some 2AF systems have an app using random codes that change every ten minutes.
Always look for the “https:” in front of the URL on the site you are visiting, especially when dealing with anything financial or crypto. Make sure you see the lock icon present somewhere on the website bar.
Keep passwords offline as much as possible. Do not store them anywhere in or on your computer. Copy them onto a piece of paper or a USB stick that you can quickly plug in and plug out. Change your passwords often. Always use long passwords with random phrases, numbers, and symbols.
Always be looking out for phishing emails. Don’t open or click on anything suspicious.
Don’t open an any email attachments from any source you don’t know and don’t click any unusual links in messages.
Never ever share your crypto private keys with anyone!
Use Cold Storage until you have to spend it or send your cryptos. Cold Storage consists of either Hardware Wallets or Paper Wallets. For your cold storage wallets, make up a PIN number a pin that is impossible to guess.
Do not leave any large amounts of crypto stored in an Exchange or mobile phone app. Use them like a transfer hub to buy or sell crypto, and then get your funds out of there as soon as possible.
Statistics show that somewhere in the world a hacker attacks a computer every 39 seconds. With a little forethought, and a few simple steps, most likely you will not have to fall prey to any of these cunning predators.
Like the frog who secures itself before the freezing hits, you can protect your cryptos, and you will enjoy the confidence knowing they are secure!